Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

All i said was true, Mahmood, Imran


Варианты приобретения
Цена: 2226.00р.
Кол-во:
 о цене
Наличие: Отсутствует. Возможна поставка под заказ.

При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Mahmood, Imran
Название:  All i said was true
ISBN: 9781526647559
Издательство: Bloomsbury
Классификация:
ISBN-10: 1526647559
Обложка/Формат: Hardback
Страницы: 320
Вес: 0.61 кг.
Дата издания: 21.07.2022
Язык: English
Размер: 163 x 241 x 33
Читательская аудитория: General (us: trade)
Рейтинг:
Поставляется из: Англии
Описание: Part of The SAGE Quantitative Research Kit, this book is an ideal companion for those looking to undertake survey research. Anchored by lots of case studies of real research and expert interviews to strengthen your understanding, it provides guidance on the range of skills needed for watertight survey research and sampling.


I know what i saw

Автор: Mahmood, Imran
Название: I know what i saw
ISBN: 1526627620 ISBN-13(EAN): 9781526627629
Издательство: Bloomsbury
Рейтинг:
Цена: 1929.00 р.
Наличие на складе: Поставка под заказ.

You don`t know me

Автор: Mahmood, Imran
Название: You don`t know me
ISBN: 1405952644 ISBN-13(EAN): 9781405952644
Издательство: Random House - Penguin
Рейтинг:
Цена: 1319.00 р.
Наличие на складе: Поставка под заказ.

Описание: Searing, poignant, insightful and achingly funny, Careless is an upmarket coming-of-age novel like no other, celebrating female friendship and the enduring hope to follow our dreams against all odds. Perfect for fans of Queenie by Candice Carty-Williams, Normal People by Sally Rooney and Everything I Know About Love by Dolly Alderton.

I know what i saw

Автор: Mahmood, Imran
Название: I know what i saw
ISBN: 1526627663 ISBN-13(EAN): 9781526627667
Издательство: Bloomsbury
Рейтинг:
Цена: 1335.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Easily plan and deliver outstanding lessons that are bespoke to your classroom needs.

Save time by following step-by-step guidance from experienced English teachers, covering all CfE Experiences and Outcomes and all benchmarks for Second Level Literacy and English.

- Prepare with ease: topic overviews at the beginning of each chapter let you know at a glance what to teach and how to teach it, with a summary of key learning objectives, core vocabulary and any barriers to learning
- Teach with confidence whatever your level of expertise: follow a structured, ready-made course with each lesson focusing on one key aspect of the curriculum, providing suggestions for best practice
- Engage the whole class: comprehensive guidance takes you through a five-part structure for each lesson, with lots of prompts for getting students actively involved in their learning
- Easily adjust activities to your classroom needs: additional suggestions for differentiation included throughout so you can support students of all ability levels
- Bring the joy of reading to your classroom: foster a love of reading with a pedagogy that centres on exciting texts

All i said was true

Автор: Imran Mahmood, Mahmood
Название: All i said was true
ISBN: 1526647532 ISBN-13(EAN): 9781526647535
Издательство: Bloomsbury
Рейтинг:
Цена: 2078.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Part of The SAGE Quantitative Research Kit, this book is an ideal companion for those looking to undertake survey research. Anchored by lots of case studies of real research and expert interviews to strengthen your understanding, it provides guidance on the range of skills needed for watertight survey research and sampling.

Zoom Video Conferencing Beginner`s Guide

Автор: Al-Assouli Hedaia Mahmood
Название: Zoom Video Conferencing Beginner`s Guide
ISBN: 1008988464 ISBN-13(EAN): 9781008988460
Издательство: Неизвестно
Рейтинг:
Цена: 1310.00 р.
Наличие на складе: Нет в наличии.

Описание:

Zoom is a video telephony software program developed by Zoom Video Communications.

Zoom is a free (plus paid-for options) video conferencing tool that can be used on PCs, Macs and mobile devices.The free plan provides a video chatting service that allows up to 100 participants concurrently, with a 40-minute time restriction, and there are lots of features to support collaborative working..

In this report, I'll just give quick guide on how to sign up and use the Zoom application. The report contains the following sections:

1. Downloading and installing the Zoom application:

2. Starting new immediate meeting:

3. Joining a meeting:

4. Scheduling a meeting:



Word Judge for Clubs and Tournaments: Official Word List of the Superscrabble Club Based on the American English Language

Автор: Mahmood Maliha Mendoza
Название: Word Judge for Clubs and Tournaments: Official Word List of the Superscrabble Club Based on the American English Language
ISBN: 1643676393 ISBN-13(EAN): 9781643676395
Издательство: Неизвестно
Рейтинг:
Цена: 6159.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges

Автор: Alassouli Hidaia Mahmood
Название: Earning Money through Crypto Currency Airdrops, Bounties, Faucets, Cloud Mining Websites and Exchanges
ISBN: 1716727332 ISBN-13(EAN): 9781716727337
Издательство: Неизвестно
Рейтинг:
Цена: 1966.00 р.
Наличие на складе: Нет в наличии.

Описание:

A crypto faucet is a website that will give you satoshis in exchange for viewing ads or completing simple tasks. Crypto currency mining is the process in which transactions between users are verified and added into the block chain. The process of mining is also responsible for introducing new coins into the existing circulating supply and is one of the key elements that allow cryptocurrencies to work as a peer-to-peer decentralized network, without the need for a third party central authority.


Cloud mining happens in the "cloud." That basically means that the hardware used for mining is not physically located at your premises, but it is accessed remotely through the internet.


An airdrop, in the cryptocurrency business, is a marketing stunt that involves sending free coins or tokens to wallet addresses in order to promote awareness of a new virtual currency.


In Bounty programs, participants get cryptocurrencies in exchange for promotion.


A cryptocurrency exchange is any system that operates on the basis of trading cryptocurrencies with other assets.


There are also some on-line service designed for those who wants to exchange electronic currencies quickly, safely and at a favorable rate, such as: Webmoney, Perfect Money, AdvCash, Payeer, Skrill, Neteller, Epay, Payza, PayPal, Visa/Master Card, Western uniоn, MoneyGram, Bitcoin, Ethereum, Litecoin.


This work will guide the user to a list of online sources to earn money in the internet through crypto faucets, mining, cloud mining, airdrops and bounties. Then I will list some of the best online crypto currency exchanges and electronic currencies exchangers that can be used.

The book consists from the following parts:

1. Some sources for crypto faucets

2. Definition of cryptocurrrency mining and cloud minining

3. Some useful websites for cryptocurrency mining and cloud minining

4. Airdrop and Bounty definitions

5. Some online sources to look for airdrops and bounties events

6. Some Youtube channels to fellow up latest airdrops, faucets and mining websites

7. Some websites to get information about cryptocurrency prices and market capitalization

8. Some trusted cryptocurrency exchanges

9. Some exchanger monitoring platforms

10. Some electronic currencies exchangers


Quick Guide for Using External Memory Card to Increase Internal Storage Space of Android Devices

Автор: Al-Assouli Hedaia Mahmood
Название: Quick Guide for Using External Memory Card to Increase Internal Storage Space of Android Devices
ISBN: 3969536553 ISBN-13(EAN): 9783969536551
Издательство: Неизвестно
Рейтинг:
Цена: 2839.00 р.
Наличие на складе: Нет в наличии.

Описание:

As we all know, there are many Android phones are facing low internal memory issue when installing games and apps. This problem is especially serious in budget phones because most of these phones have little memory; for example, some Android phones only have 4G memory.

If you are running insufficient storage space on your Android phone, you can expand and increase internal memory through several different methods.

The common methods that can help to increase internal storage space of android.

- Method 1. Turn to cloud storage

- Method 2. Use USB OTG storage

- Method 3. Delete unwanted Apps and clean all the history and cache

- Method 4. Use Memory card to increase internal storage space of Android device.

- Method 5. Use Terminal Emulator App

- Method 6. Use Mounts2SD App

- Methods 7: Install and Run GOM Saver to Increase Storage Space on Android Phone

- Method 8: Install Root External 2 Internal SD App

In this report I will investigate the possible methods that can be used to increase the internal storage of Android device. I will also show how to troubleshoot and solve certain problem that we get when having Android devices. The report consists from the following parts:

1. Turning to cloud storage.

2. Using USB OTG storage.

3. Deleting unwanted Apps and clean all the history and cache.

4. How to root an android device.

5. Using external memory card to increase internal storage space of Android device.

6. Using Apps2SD App.

7. How to partition and format disks in windows using Diskpart tool.

8. Using Terminal Emulator App

9. How to transfer your Google Authenticator 2FA to a new phone.

10. How to install the ADB Driver on your Windows PC to communicate with an android device.

11. Installing Init.d, Busybox and mound2SD Apps on an Android device to increase the internal memory.

12. How to unlock the boot loader via fastboot on Android.

13. Installing TWRP custom recovery on an android device.

14. Installing ClockworkMod CWM recovery on an android phone.

15. Installing GOM Saver to increase storage space on Android device.

16. Installing Root External 2 Internal SD APK.

17. Installing Custom Rom.

18. How to recover your deleted Whatsapp messages.

19. How to backup Android devices personal data.

20. How to root the Samsung GT-S5310 using Odin flash tool:

21. How to root the Samsung Galaxy A7 (SM-A700FD)

22. How to flash the Samsung Galaxy A7 (SM-A700FD) with firmware file.

23. How to root Galaxy A7 A700FD] and install TWRP Recovery

24. How to root the Android device using Magisk

25. How to use Magisk to hide the root for Apps that can't accept to be installed in rooted devices




Power Factor Correction

Автор: Alasooly Hedaya Mahmood
Название: Power Factor Correction
ISBN: 1716038146 ISBN-13(EAN): 9781716038143
Издательство: Неизвестно
Рейтинг:
Цена: 4805.00 р.
Наличие на складе: Нет в наличии.

Описание:

Power systems have two components of apparent power: active and reactive power. Both components are necessary for functioning of electrical systems. The active power is the average power absorbed by the resistive load. The reactive power is the measure of energy exchange between the source and reactive power of load. Energy storage devices do not dissipate or supply power, but exchange power with the rest of system.

Active power is the one that is converted to other forms of energy in the load yet reactive power is only responsible for magnetizing purposes. Power factor is a ratio depicting how much of the power supplied is real. The reactive current contribute in the value of the overall magnitude of current in transmission lines causing unnecessarily high line currents and low power factor.

Since a low power factor means higher amount of apparent power need to be supplied by the utility company, thus the company must also use bigger generators, large transformers and thicker transmission/distribution lines. This requires a higher capital expenditure and operational cost which usually result in the cost being passed to the consumer.

In this research, we seek to identify the effects of a low power factor on Swaziland Electricity Company's power supply system and recommend possible solutions to the problem. The results are useful in determining how to optimally deliver power to a load at a power factor that is reasonably close to unity, thus reducing the utility's operational costs while increasing the quality of the service being supplied.

TABLE OF CONTENTS


- ABSTRACT


- CHAPTER 1: INTRODUCTION


- CHAPTER 2: LITERATURE REVIEW


- CHAPTER 3: RESEARCH METHODOLOGY


- CHAPTER 4: DATA COLLECTION


- CHAPTER 5: RESULTS AND ANALYSIS OF THE SIMULATION MODEL


- CHAPTER 6: BENEFITS OF POWER FACTOR CORRECTION


- CHAPTER 7: FINDINGS, RECOMMENDATIONS AND CONCLUSIONS


- REFERENCES


- APPENDIXES


- Appendix A: Load Profiles


- Appendix B - Substations


- Appendix C: Simulation Results


Some Examples Related to Ethical Computer Networking Hacking

Автор: Alassouli Hidaia Mahmood
Название: Some Examples Related to Ethical Computer Networking Hacking
ISBN: 1649190425 ISBN-13(EAN): 9781649190420
Издательство: Неизвестно
Рейтинг:
Цена: 4368.00 р.
Наличие на складе: Нет в наличии.

Описание:

The objective of this work is to provide some quick tutorials in computer networking hacking.


The work includes the following tutorials:

- Tutorial 1: Setting Up Penetrating Tutorial in Linux.

- Tutorial 2: Setting Up Penetrating Tutorial in Windows.

- Tutorial 3: OS Command Injection:

- Tutorial 4: Basic SQL Injection Commands.

- Tutorial 5: Manual SQL injection using order by and union select technique.

- Tutorial 6: Damping SQL Tables and Columns Using the SQL Injection.

- Tutorial 7: Uploading Shell in the Site having LFI.

- Tutorial 8: Advanced Way for Uploading Shell

- Tutorial 9: Uploading shell Using Sqli Command.

- Tutorial 10: Uploading Shell Using SQLmap

- Tutorial 11: Post Based SQL Injection

- Tutorial 12: Cracking the Hashes Using Hashcat.

- Tutorial 13: Hacking windows 7 and 8 through Metasploite

- Tutorial 14: Tutorial on Cross Site Scripting

- Tutorial 15: Hacking Android Mobile Using Metasploit

- Tutorial 16: Man of the middle attack:

- Tutorial 17: Using SQLmap for SQL injection

- Tutorial 18: Hide Your Ip

- Tutorial 19: Uploading Shell and Payloads Using SQLmap

- Tutorial 20: Using Sql Shell in SQLmap

- Tutorial 21: Blind SQL Injection

- Tutorial 22: Jack Hridoy SQL Injection Solution

- Tutorial 23: Using Hydra to Get the Password

- Tutorial 24: Finding the phpmyadmin page using websploit.

- Tutorial 25: How to root the server using back connect

- Tutorial 25: How to root the server using back connect

- Tutorial 26: HTML Injection

- Tutorial 27: Tutuorial in manual SQl Injection

- Tutorial 28: Venom psh-cmd-exe payload

- Tutorial 29: Cross site Request Forgery (CSRF)

- Tutorial 30: Disable Victim Computer

- Tutorial 31: Exploit any firefox by xpi_bootstrapped addon

- Tutorial 32: Hack android mobile with metasploit

- Tutorial 33: PHP Code Injection to Meterpreter Session

- Tutorial 34: Basic google operators

- Tutorial 35: Hacking Credit Cards with google

- Tutorial 36: Finding Vulnerable Websites in Google

- Tutorial 37: Using the httrack to download website

- Tutorial 38: Getting the credit cards using sql injection and the SQLi dumper

- Tutorial 39: Using burp suite to brute force password


Evaluation of Some Windows and Linux Intrusion Detection Tools

Автор: Alasooly Hedaya Mahmood
Название: Evaluation of Some Windows and Linux Intrusion Detection Tools
ISBN: 1716728266 ISBN-13(EAN): 9781716728266
Издательство: Неизвестно
Рейтинг:
Цена: 1529.00 р.
Наличие на складе: Нет в наличии.

Описание:

The paper evaluates some the security tools. Top security tools can be found in http: //sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools:

  • LANguard
  • Nessus
  • Snort
  • BASE
  • ACID
  • Rman
  • SnortCenter.
  • OSSEC
  • Sguil



Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks

Автор: Al-Assouli Hedaia Mahmood
Название: Footprinting, Reconnaissance, Scanning and Enumeration Techniques of Computer Networks
ISBN: 1008983713 ISBN-13(EAN): 9781008983717
Издательство: Неизвестно
Рейтинг:
Цена: 1747.00 р.
Наличие на складе: Нет в наличии.

Описание:

Reconnaissance is a set of processes and techniques (Footprinting, Scanning & Enumeration) used to covertly discover and collect information about a target system. During reconnaissance, an ethical hacker attempts to gather as much information about a target system as possible.


Footprinting refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. An Ethical hacker has to spend the majority of his time in profiling an organization, gathering information about the host, network and people related to the organization. Information such as ip address, Whois records, DNS information, an operating system used, employee email id, Phone numbers etc is collected.

Network scanning is used to recognize available network services, discover and recognize any filtering systems in place, look at what operating systems are in use, and to protect the network from attacks. It can also be used to determine the overall health of the network.

Enumeration is defined as the process of extracting user names, machine names, network resources, shares and services from a system. The gathered information is used to identify the vulnerabilities or weak points in system security and tries to exploit in the System gaining phase.

The objective of the report is to explain to the user Footprinting, Reconnaissance, Scanning and Enumeration techniques and tools applied to computer networks

The report contains of the following parts:

Part A: Lab Setup

Part B: Foot printing and Reconnaissance

Part C: Scanning Methodology

Part D: Enumeration



ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия